In scope
- All Prediction Arena smart contracts on Polygon (asset prediction, factory, tournaments, referral)
- Our public web application
- Our public APIs
- Any endpoint that handles signed messages, oracle data, or user authentication
Out of scope
- Third-party services we depend on (oracle networks, RPC providers, hosting providers — please report those to the upstream vendor)
- Social engineering of Prediction Arena employees
- Denial-of-service attacks against our public infrastructure (please don’t)
- Issues already reported by another researcher or already fixed
Reward tiers (indicative)
| Severity | Description | Reward |
|---|---|---|
| Critical | Direct theft of user funds, oracle bypass, settlement forgery | Up to $250,000 |
| High | Permanent freezing of user funds, round resolution manipulation | Up to $50,000 |
| Medium | Temporary DoS of round settlement, info leak of in-window picks | Up to $10,000 |
| Low | Hardening recommendations, minor info disclosure | Up to $1,500 |
How to report
Email dev@predictionarenas.app with:- A clear description of the vulnerability
- Steps to reproduce
- Impact assessment
- Any proof-of-concept code (optional but appreciated)
